@@ -56,13 +56,13 @@ const ExternalAPIVersion = "4.0.0"
5656const InternalAPIVersion = "3.0.0"
5757
5858const legalWarning = `
59- WARNING!
59+ WARNING!
6060
6161Clef is alpha software, and not yet publically released. This software has _not_ been audited, and there
6262are no guarantees about the workings of this software. It may contain severe flaws. You should not use this software
63- unless you agree to take full responsibility for doing so, and know what you are doing.
63+ unless you agree to take full responsibility for doing so, and know what you are doing.
6464
65- TLDR; THIS IS NOT PRODUCTION-READY SOFTWARE!
65+ TLDR; THIS IS NOT PRODUCTION-READY SOFTWARE!
6666
6767`
6868
@@ -136,7 +136,7 @@ var (
136136 configdirFlag ,
137137 },
138138 Description : `
139- The init command generates a master seed which Clef can use to store credentials and data needed for
139+ The init command generates a master seed which Clef can use to store credentials and data needed for
140140the rule-engine to work.` ,
141141 }
142142 attestCommand = cli.Command {
@@ -150,10 +150,10 @@ the rule-engine to work.`,
150150 signerSecretFlag ,
151151 },
152152 Description : `
153- The attest command stores the sha256 of the rule.js-file that you want to use for automatic processing of
154- incoming requests.
153+ The attest command stores the sha256 of the rule.js-file that you want to use for automatic processing of
154+ incoming requests.
155155
156- Whenever you make an edit to the rule file, you need to use attestation to tell
156+ Whenever you make an edit to the rule file, you need to use attestation to tell
157157Clef that the file is 'safe' to execute.` ,
158158 }
159159
@@ -168,7 +168,7 @@ Clef that the file is 'safe' to execute.`,
168168 signerSecretFlag ,
169169 },
170170 Description : `
171- The setpw command stores a password for a given address (keyfile). If you enter a blank passphrase, it will
171+ The setpw command stores a password for a given address (keyfile). If you enter a blank passphrase, it will
172172remove any stored credential for that address (keyfile)
173173` ,
174174 }
@@ -258,12 +258,12 @@ func initializeSecrets(c *cli.Context) error {
258258 }
259259 fmt .Printf ("A master seed has been generated into %s\n " , location )
260260 fmt .Printf (`
261- This is required to be able to store credentials, such as :
261+ This is required to be able to store credentials, such as :
262262* Passwords for keystores (used by rule engine)
263263* Storage for javascript rules
264264* Hash of rule-file
265265
266- You should treat that file with utmost secrecy, and make a backup of it.
266+ You should treat that file with utmost secrecy, and make a backup of it.
267267NOTE: This file does not contain your accounts. Those need to be backed up separately!
268268
269269` )
0 commit comments